Once Gooligan is installed, it attempts to root the device, as a way to gain full control. The malware does this by exploiting well-known vulnerabilities in older versions of Android.

“These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user,” Checkpoint said.

Checkpoint

Gooligan will then go on to steal the user's Google authorization tokens, giving the malware access to Gmail, Google Play, and other related services.

Of the 1 million Google accounts breached, 19 percent were based in the Americas, 9 percent in Europe, while 57 percent were in Asia, according to Checkpoint.

By gaining access to users' Google accounts, the malware is likely attempting to generate revenue for its creators. It does this by installing apps promoted by legitimate advertising networks, and then writing positive reviews for them on Google Play.

“An attacker is paid by the network when one of these apps is installed successfully,” Checkpoint said.

Security researchers first noticed an earlier version of Gooligan last year, when it appeared in the malicious SnapPea app. It wasn’t until this past summer that the malware reappeared with upgraded processes.

Checkpoint has published a website that lets users check if their Google account was breached by Gooligan.

Security experts also caution users should avoid downloading apps from third-party app stores. This is because these stores often do little to verify that the apps offered are safe for use.

The creators of Gooligan are also spreading the malware by sending SMS text messages to unsuspecting victims containing links to download apps carrying the harmful coding.

Google didn’t immediately respond to a request for comment. But Checkpoint said that Google is investigating the matter and revoking authentication tokens that were stolen by the malware.